000 | 03617nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-030-60890-3 | ||
003 | DE-He213 | ||
005 | 20220801220519.0 | ||
007 | cr nn 008mamaa | ||
008 | 210612s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030608903 _9978-3-030-60890-3 |
||
024 | 7 |
_a10.1007/978-3-030-60890-3 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aFunctional Encryption _h[electronic resource] / _cedited by Khairol Amali Bin Ahmad, Khaleel Ahmad, Uma N. Dulhare. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aX, 309 p. 84 illus., 18 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aEAI/Springer Innovations in Communication and Computing, _x2522-8609 |
|
505 | 0 | _aIntroduction -- Foundations of Functional Encryption -- Mathematical Concepts and Properties -- Elliptic Curve Cryptography -- XTR Algorithm: Efficient and Compact Subgroup Trace Representation -- HECC: Hyperelliptic Curve Cryptography -- Pairing-Based Cryptography -- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units -- Cocks IBE Scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchical IBE -- Extensions of IBE and Related Primitives -- Attribute Based Encryption -- Digital Signatures -- Applications of Functional Encryption -- IRON: Functional Encryption Using Intel SGX -- Conclusion. | |
520 | _aThis book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature and digital watermarking. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aMathematics. _911584 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aApplications of Mathematics. _931558 |
700 | 1 |
_aAhmad, Khairol Amali Bin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _950746 |
|
700 | 1 |
_aAhmad, Khaleel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _919374 |
|
700 | 1 |
_aDulhare, Uma N. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _950747 |
|
710 | 2 |
_aSpringerLink (Online service) _950748 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030608897 |
776 | 0 | 8 |
_iPrinted edition: _z9783030608910 |
776 | 0 | 8 |
_iPrinted edition: _z9783030608927 |
830 | 0 |
_aEAI/Springer Innovations in Communication and Computing, _x2522-8609 _950749 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-60890-3 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78644 _d78644 |